Bluetooth Technology
description
Transcript of Bluetooth Technology
![Page 1: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/1.jpg)
Bluetooth Technology
• Jason Babel• Kyle Musal• Joshua Turella• Zdravko Tyankov
![Page 2: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/2.jpg)
History
• 1994 – Ericsson Initiated Study
• Low-power, low-cost radio interface
• Unite computer devices and telecommunications
![Page 3: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/3.jpg)
Beginnings
• 09/1998 – Special Interest Group (SIG) Founded
• 12/1999 – Big Names Join Movement
• Technology Was Free To Public
![Page 4: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/4.jpg)
The Name and Logo
• Danish Viking King Harald Blatand
• United Warring Factions of Denmark and Norway
• Runic Letters Used For Logo
![Page 5: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/5.jpg)
Bluetooth Communication
• Bluetooth operates on the ISM band (2.402-2.480GHz)
• The ISM band is set aside for
Industrial, Scientific and Medical devices.
• ISM is a low powered unlicensed frequency band.
http://bluetooth.com
![Page 6: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/6.jpg)
http://bluetooth.com
• Bluetooth avoids interference by using spread-spectrum frequency hopping and a low power signal.
• By using spread-spectrum frequency hopping a bluetooth device will change frequencies 1,600 times per second.
• Bluetooth is low powered which means that only devices within 32 feet can potentially cause interference, when used to FCC standards.
Bluetooth Communication
![Page 7: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/7.jpg)
Avoiding Interference
• By using spread-spectrum frequency hopping, a bluetooth device can pick from 79 different channels within the ISM band; 1,600 times per second.
• This avoids interference because if two Bluetooth devices operate on the same frequency and interfere with each other the interference will only last 1/1600 second.
• This short period of interference will not be noticed by the user.
![Page 8: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/8.jpg)
Avoiding Interference
• By using a low power signal a Bluetooth device reduces its chances of interference even further.
• The chances of two Bluetooth devices potentially operating on the same frequency and interfering is low because of the short range.
http://gpc.edu/~pgore/PhysicalScience/destructive.gif
![Page 9: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/9.jpg)
Bluetooth Security
• Bluetooth devices can use a PIN to prevent unauthorized access.
• Bluetooth devices can be set to undiscoverable; this prevents unauthorized users from accessing your Bluetooth device.
http://www.securityfocus.com/infocus/1830
![Page 10: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/10.jpg)
Bluetooth Security• Bluetooth devices use a unique 48bit device
identifier, a MAC address. This address takes the form 00:8F:DF:02:BF:7C.
• Because of the amount of addresses it is difficult for a “hacker” to find the MAC address of a Bluetooth device set to undiscoverable.
• The MAC address of Bluetooth devices is not encrypted during communication and maybe intercepted potentially allowing unauthorized access to your Bluetooth device.
![Page 11: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/11.jpg)
Bluetooth Security• Bluetooth’s frequency hopping technique
makes it difficult to intercept its communication because the frequency is always changing. Equipment capable of synchronizing to the frequency hopping is needed and is very expensive.
• Usually the data sent by Bluetooth devices is of low importance, meaning it has a inherently lower risk of interception or desire for interception.
http://static.howstuffworks.com/gif/bluetooth-card.jpg
![Page 12: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/12.jpg)
Bluetooth Security
• Overall the risk of unauthorized access to your Bluetooth device is low because these methods and the high cost of equipment capable of synchronizing with Bluetooth frequency hopping.
• However with all wireless communication there is some risk involved.
http://www.cnet.com/i/ts/ces/2004/ps/BluetoothPhone_OVR_300.gif
![Page 13: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/13.jpg)
So What Exactly is Bluetooth?
• Hardware• A chip that establishes links and
protocols
• Software• Where the user actual can interact• Programs are written to handle the data
![Page 14: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/14.jpg)
Hardware
• A chip that creates a Bluetooth connection• Usually Low Power
• 1 milliwatt signal• Avoids Interference
• Limits Range• 10 Meters (32
Feet)
http://www.a7eng.com/products/embeddedblue/images/eb501_top.jpg
![Page 15: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/15.jpg)
Hardware
• Serial Adapter• Replaces current
serial wires with this chip to create a Bluetooth connection between devices
• Similar designs can be found for other I/O ports such as USB
Antenna Attachment
Serial Port
DC Input
http://www.a7eng.com/products/embeddedblue/images/eb501_top.jpg
![Page 16: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/16.jpg)
Software
• Once connection is established, the software determines what to do with data
• User can create his/her own applications if savvy enough
![Page 17: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/17.jpg)
Software
• A Multitude of Software is out there• Software to do things such as:
• Transfer files to and from your phone• Route Mobile Calls to Your Home Phone
when in Range• Use your Phone as a remote for you
computer (good for PowerPoint presentations)
![Page 18: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/18.jpg)
Piconet
• A group of Bluetooth devices communicating with each other
• 1 master, up to 7 slaves
• Master determines hopping pattern M
M
SS
S
S
P
P
P
M=Master SB=Standby
P=Parked S=Slave
http://eceserv0.ece.wisc.edu/~sharmav/bluetooth/archive.htm
![Page 19: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/19.jpg)
Sending in a Piconet
fk+2
625 sSlot 3
fk+3
Frame 2
Slot4
t
fk+1
Frame 1
Slot2
Master
Slave1
fk
625 sSlot 1
http://eceserv0.ece.wisc.edu/~sharmav/bluetooth/archive.htm
![Page 20: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/20.jpg)
Sending in a Piconet
Master
Slave1
fk fk+1 fk+2 fk+3 fk+4 fk+5
Slave2
http://eceserv0.ece.wisc.edu/~sharmav/bluetooth/archive.htm
![Page 21: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/21.jpg)
Piconet Efficiency
0
10
20
30
40
50
60
70
80
0 10 20 30 40 50 60 70 80 90 100
0
10
20
30
40
50
60
70
80
Piconet A Piconet B Piconet C Piconet D Piconet E Piconet F Piconet G Piconet H Piconet I Piconet JContention Contention Contention Contention Contention Contention Contention Contention Contention Contention
Total Transmission Slots: 1000 Transmission Slots Hit: 112 Transmission Efficiency: ~89%Active Piconets: 10
• Ten active piconets
• 56 collisions• 1000 transmission slots
• 112 slots corrupted• ~89% net efficiency
http://eceserv0.ece.wisc.edu/~sharmav/bluetooth/archive.htm
![Page 22: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/22.jpg)
Pairing
• To become paired:• Two devices A and B
• A is searching for other devices to connect to it
• B enters the range and A detects it• A Passkey is entered into both devices• If A’s Passkey matches B’s passkey
• A trusted pair is formed• As long as it is enabled on the devices,
authentication shouldn’t have to be done again if Device B leaves range and enters again later
![Page 23: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/23.jpg)
How it all fits together• There is a Bluetooth
Piconet already set up.• Lets say in it there is
currently a computer, a stereo, and the house lighting in it.• The Computer is the
Master• Another Bluetooth device
is a Bluetooth House phone not connected to any system
• So what can we do?• Computer can control the
lights and stereo. Slave
Master
Computer
StereoHome PhoneLights
![Page 24: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/24.jpg)
Things to Realize
• The Computer talks to both the Stereo and the Lights, and they both talk back.
• Stereo and Lights never talk to each other
• Computer determines hop pattern.• All Devices Have Been on the Network
Before• Already Paired
![Page 25: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/25.jpg)
Enter New Device
• Add a Cell phone• Person Walks into Room• As it gets in range a radio signal is sent
out with its address• A range of addresses are given for the type
of device• If a device can connect to the device (it
knows what range addresses it can connect to) it will.
![Page 26: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/26.jpg)
We’re Talking Now
• The Computer and Home phone respond• The Computer sees that it has paired
with it before and connects it as a slave to its group
• The Computer sets up the pseudo-random hopping sequence using its clock and address
• The Cell Phone does the same with the Home Phone
![Page 27: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/27.jpg)
Alright…
• Now the Cell Phone can send and receive files from the computer.
• The Cell Phone will now route all calls to the Home Phone.
• Two Piconets have been formed
Slave
Master
Computer Cell
StereoHome PhoneLights
![Page 28: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/28.jpg)
Advantages
• Bluetooth Devices are wireless• Bluetooth Tech is inexpensive• Bluetooth is automatic• Standardized Protocol
![Page 29: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/29.jpg)
Advantages
• Low Interference• Low Energy Consumption• Share Voice and Data• Endless applications…
![Page 30: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/30.jpg)
Disadvantages
• Low Data Transfer Rate• 721 Kbps
• Range – 30ft• Mediocre Security
• bluejacking • bluebugging • bluesnarfing • Car Whisperer
![Page 31: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/31.jpg)
Where is it used?
• Wireless Control & Communication
• Data Transmission• Cordless Desktop PC• Mobile Gaming
![Page 32: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/32.jpg)
Wireless Control & Communication
• Communication between:• Cell phone and a
hands-free headset• PC and wireless
input and output devices
• Game Consoles and their wireless controllers
![Page 33: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/33.jpg)
Data Transmission• Bluetooth enabled
devices:• Mobile phones• Smartphones• PDAs• Notebooks• GPS Receivers
• Data types:• Voice, Video,
Images, Files and Data
![Page 34: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/34.jpg)
Cordless Desktop PC• Connection between
PC and it’s peripherals:• Mouse• Keyboard/game pad• Printer/Scanner• Speaker system• Modems• Cameras
![Page 35: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/35.jpg)
Mobile Gaming• Devices:
• Nokia N-gage• Gizmondo
• Purpose:• New level of
gaming
• Play with all your friends
• Play anytime, anyplace
![Page 36: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/36.jpg)
The Future
• 05/2005 – Announced To Team Up With UWB Developers (~480mbits/s)
• Estimated 2 Billion Devices Shipped Per Year By 2010
![Page 37: Bluetooth Technology](https://reader035.fdocuments.in/reader035/viewer/2022081501/56813dea550346895da7c22b/html5/thumbnails/37.jpg)
Questions
Questions?